Cybersecurity training within the framework of the Digital Municipality program
A professionally prepared cybersecurity training for municipalities. Key topics that enable efficient implementation of new solutions within the Digital Municipality project.
About the training
An effective training for municipal employees who want to expand their knowledge in the field of Cybersecurity.
The training is conducted in the form of a lecture and workshops, ensuring the effective application of new knowledge and skills to practical actions. We focus not only on delivering theoretical knowledge but, most importantly, on providing effective, practical methods and techniques, as well as valuable experiences and best practices. The training is one day long, and upon completion, participants will receive a certificate of attendance. During the training, key topics related to Cybersecurity for local government representatives will be discussed. The materials and exercises conducted during the training will prepare participants to perform their duties within the scope of the training.
Training objective
- Raising awareness about cybersecurity among employees participating in the training.
- Providing support in clarifying any doubts or questions related to cybersecurity issues raised by participants.
- Acquiring both theoretical and practical knowledge to prepare participants for their duties related to Cybersecurity.
- Enhancing skills in the practical application of cybersecurity procedures.
- Assisting in improving the overall security level within the organization.
- Providing effective training for individuals aiming to expand their knowledge in Cybersecurity.
- Awarding certificates to participants upon successful completion of the training.
Target audience for the training
The Digital Municipality Program is aimed at all municipalities in Poland (urban, urban-rural, and rural). The training itself is directed at employees of the Municipal Offices. Employees at all levels should participate in the training. One of the main objectives of the Digital Municipality Program is digital education for local government units (JST) regarding the operation of acquired equipment, software, and licenses.
Language of the training
The training is conducted in Polish.
Upon request, it is also possible to organize the training in English.
Training methodology
Achieving the desired training outcomes is possible by selecting both the appropriate topics and training methods tailored to the specific needs of the participants and the subject matter of the training. Below, we present the methods and techniques we use:
- LECTURE
We provide knowledge to participants based on dedicated teaching aids, such as multimedia presentations. This is the foundational part of the training, during which we introduce the topic, discuss key concepts, describe roles, processes, procedures, etc. - PRACTICAL EXAMPLES
As practitioners, we base the training program on real-life events presented to address a specific issue. We help participants draw conclusions or solutions independently. Our training is strongly focused on practice and the development of participants’ skills. - DISCUSSION
Participants share their opinions and exchange experiences. A well-structured discussion topic, thanks to the confrontation of at least two viewpoints, usually generates high emotional involvement. The discussion allows for the development of a common solution or the preparation of arguments regarding a given issue. - BRAINSTORMING
In a short period, we generate many ideas and solutions for specific problems and situations. We engage participants, stimulate thinking, and encourage creativity. - EXERCISES
Practical tasks related to the subject of the training, such as creating a process, performing a case study, etc. These effectively complement the lecture and practical examples. - TESTS
We verify the participant’s level of knowledge and skills. We identify competency gaps and plan the education process to enhance the participant’s abilities. Depending on the nature of the training, this may involve various tools, such as knowledge tests or performance tasks. - SIMULATIONS
These provide an excellent sample of reality, in which participants actively engage and experience the outcomes of their actions. - SUMMARY
After completing each topic, we summarize the material discussed. This is done by the trainer and allows participants to revisit the most important aspects of the subject matter while providing an opportunity to verify their understanding.
Trainer
Training conducted by one of our trainers:
Weronika Stachowiak
A graduate of Geology from Adam Mickiewicz University in Poznań and Business Management with a specialization in risk analysis in projects from the Poznań School of Banking. Throughout her professional career, she has provided advisory, analytical, and training services in the areas of personal data protection and database management. She has extensive experience in working with public local government institutions and educational institutions, as well as with private companies in the financial sector. At PBSG, she serves as a Consultant in the areas of personal data protection, information security, and risk management.
Katarzyna Żuk
A graduate of the Faculty of Law at Adam Mickiewicz University in Poznań. She has over 10 years of experience in the commercial sector. She has provided advisory services in civil and commercial matters for companies in their day-to-day operations. From a scientific perspective, she is interested in practical logic. She has completed numerous training courses on the creation, application, and theory of law, which she passionately applies in practice. At PBSG, she is responsible for supporting projects related to information security, personal data protection, and the associated document analysis.
Dedicated exclusively for your organization – this approach guarantees comfort and flexibility to thoroughly discuss specific issues and situations within your organization. We understand that every company is different, so to effectively translate the acquired knowledge into practical solutions for your organization, we tailor the presented examples to your specific needs and business circumstances.
Training program
Day 1
9:00 - 16:00
- Welcome Participants
- Practical Approach to Cybersecurity Requirements
- What are the main assumptions and legal requirements?
- What is the practice in this area?
- Specific daily challenges and needs related to meeting the requirements and needs of the organization.
- Local Government Unit (LGU) in the context of KRI – understanding the requirements.
- Requirements related to the informatization of the office.
- Managing IT systems.
- LGU as a “public entity” in the KSC – the need to address requirements.
- The greatest threats that may arise in daily work.
- How to ensure a high level of security?
- Compliance audit challenges.
- The auditing process in a public entity.
- Identifying non-compliance in ongoing work.
- Scope and documentation of audits in the area of cybersecurity.
- Cybersecurity Management Process
- Procedures and documentation, considering the specifics of Local Government Units.
- Implementing procedures within cybersecurity.
- Context of ISO 22301 Business Continuity Management and ISO 27001 Information Security Management System in public entities.
- Questions from participants and discussion.
How does it work?
Step 1
APPLICATION
In the first step, fill out the application form to inform us of your interest in organizing a dedicated training session for your company.
Step 2
DATE
We will set the date and location of the training – we will adjust to your availability and individual expectations.
Step 3
PRICE
We will present the commercial terms for organizing the training based on the agreed parameters and the number of participants.
Step 4
TRAINING
We will deliver the customized training according to the agreed terms.